tccli 3.0.1215.1__py2.py3-none-any.whl → 3.0.1217.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (282) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argparser.py +1 -1
  3. tccli/command.py +2 -2
  4. tccli/configure.py +46 -1
  5. tccli/credentials.py +25 -0
  6. tccli/main.py +6 -2
  7. tccli/plugins/sso/__init__.py +61 -0
  8. tccli/plugins/sso/configs.py +4 -0
  9. tccli/plugins/sso/configure.py +45 -0
  10. tccli/plugins/sso/login.py +144 -0
  11. tccli/plugins/sso/logout.py +21 -0
  12. tccli/plugins/sso/terminal.py +161 -0
  13. tccli/plugins/sso/texts.py +40 -0
  14. tccli/services/__init__.py +6 -3
  15. tccli/services/acp/v20220105/api.json +7 -7
  16. tccli/services/acp/v20220105/examples.json +2 -2
  17. tccli/services/aiart/v20221229/api.json +29 -29
  18. tccli/services/aiart/v20221229/examples.json +8 -8
  19. tccli/services/apigateway/v20180808/api.json +18 -17
  20. tccli/services/apigateway/v20180808/examples.json +12 -12
  21. tccli/services/apm/v20210622/api.json +118 -4
  22. tccli/services/asr/v20190614/api.json +21 -20
  23. tccli/services/asr/v20190614/examples.json +13 -13
  24. tccli/services/autoscaling/v20180419/api.json +371 -309
  25. tccli/services/autoscaling/v20180419/examples.json +17 -17
  26. tccli/services/batch/v20170312/api.json +7 -7
  27. tccli/services/bda/v20200324/api.json +39 -31
  28. tccli/services/bda/v20200324/examples.json +9 -9
  29. tccli/services/bh/__init__.py +4 -0
  30. tccli/services/bh/bh_client.py +3428 -0
  31. tccli/services/bh/v20230418/api.json +8180 -0
  32. tccli/services/bh/v20230418/examples.json +519 -0
  33. tccli/services/bi/v20220105/api.json +80 -4
  34. tccli/services/bi/v20220105/examples.json +1 -1
  35. tccli/services/billing/billing_client.py +53 -0
  36. tccli/services/billing/v20180709/api.json +330 -24
  37. tccli/services/billing/v20180709/examples.json +8 -0
  38. tccli/services/bsca/v20210811/api.json +223 -18
  39. tccli/services/bsca/v20210811/examples.json +4 -4
  40. tccli/services/btoe/v20210514/api.json +4 -4
  41. tccli/services/btoe/v20210514/examples.json +2 -2
  42. tccli/services/ca/v20230228/api.json +60 -0
  43. tccli/services/cam/v20190116/api.json +11 -11
  44. tccli/services/cat/v20180409/api.json +9 -0
  45. tccli/services/cbs/v20170312/api.json +200 -188
  46. tccli/services/cbs/v20170312/examples.json +4 -4
  47. tccli/services/ccc/ccc_client.py +53 -0
  48. tccli/services/ccc/v20200210/api.json +541 -325
  49. tccli/services/ccc/v20200210/examples.json +26 -18
  50. tccli/services/cdb/cdb_client.py +13 -13
  51. tccli/services/cdb/v20170320/api.json +308 -274
  52. tccli/services/cdb/v20170320/examples.json +38 -38
  53. tccli/services/cdc/v20201214/api.json +283 -270
  54. tccli/services/cdc/v20201214/examples.json +26 -26
  55. tccli/services/cdn/v20180606/api.json +5 -3
  56. tccli/services/cds/v20180420/api.json +82 -76
  57. tccli/services/cds/v20180420/examples.json +1 -1
  58. tccli/services/cdwch/v20200915/api.json +1 -1
  59. tccli/services/cdwdoris/v20211228/api.json +54 -4
  60. tccli/services/cdz/v20221123/api.json +41 -5
  61. tccli/services/cfg/v20210820/api.json +31 -0
  62. tccli/services/cfs/v20190719/api.json +89 -1
  63. tccli/services/cfs/v20190719/examples.json +1 -1
  64. tccli/services/cfw/cfw_client.py +0 -53
  65. tccli/services/cfw/v20190904/api.json +1895 -2011
  66. tccli/services/cfw/v20190904/examples.json +175 -171
  67. tccli/services/ciam/v20220331/api.json +316 -315
  68. tccli/services/ciam/v20220331/examples.json +49 -49
  69. tccli/services/ckafka/v20190819/api.json +104 -75
  70. tccli/services/clb/v20180317/api.json +48 -26
  71. tccli/services/clb/v20180317/examples.json +1 -1
  72. tccli/services/cloudapp/v20220530/api.json +5 -1
  73. tccli/services/cloudaudit/cloudaudit_client.py +30 -30
  74. tccli/services/cloudaudit/v20190319/api.json +254 -211
  75. tccli/services/cloudaudit/v20190319/examples.json +19 -19
  76. tccli/services/cloudstudio/v20230508/api.json +38 -37
  77. tccli/services/cloudstudio/v20230508/examples.json +4 -4
  78. tccli/services/cls/cls_client.py +216 -4
  79. tccli/services/cls/v20201016/api.json +935 -147
  80. tccli/services/cls/v20201016/examples.json +43 -5
  81. tccli/services/csip/v20221121/api.json +2566 -2386
  82. tccli/services/csip/v20221121/examples.json +108 -108
  83. tccli/services/cvm/v20170312/api.json +191 -112
  84. tccli/services/cvm/v20170312/examples.json +2 -2
  85. tccli/services/cwp/cwp_client.py +4 -110
  86. tccli/services/cwp/v20180228/api.json +6498 -6252
  87. tccli/services/cwp/v20180228/examples.json +372 -412
  88. tccli/services/cynosdb/v20190107/api.json +170 -110
  89. tccli/services/cynosdb/v20190107/examples.json +91 -91
  90. tccli/services/dasb/v20191018/api.json +859 -637
  91. tccli/services/dasb/v20191018/examples.json +101 -101
  92. tccli/services/dcdb/dcdb_client.py +114 -61
  93. tccli/services/dcdb/v20180411/api.json +141 -7
  94. tccli/services/dcdb/v20180411/examples.json +32 -0
  95. tccli/services/dlc/v20210125/api.json +21 -11
  96. tccli/services/dnspod/dnspod_client.py +417 -46
  97. tccli/services/dnspod/v20210323/api.json +751 -30
  98. tccli/services/dnspod/v20210323/examples.json +62 -0
  99. tccli/services/domain/v20180808/api.json +3 -3
  100. tccli/services/domain/v20180808/examples.json +3 -3
  101. tccli/services/dts/v20211206/api.json +4 -4
  102. tccli/services/eb/v20210416/api.json +15 -15
  103. tccli/services/eb/v20210416/examples.json +1 -1
  104. tccli/services/ecm/v20190719/api.json +2 -2
  105. tccli/services/emr/v20190103/api.json +339 -114
  106. tccli/services/emr/v20190103/examples.json +64 -82
  107. tccli/services/es/es_client.py +249 -37
  108. tccli/services/es/v20180416/api.json +550 -0
  109. tccli/services/es/v20180416/examples.json +33 -1
  110. tccli/services/ess/ess_client.py +53 -0
  111. tccli/services/ess/v20201111/api.json +192 -38
  112. tccli/services/ess/v20201111/examples.json +35 -9
  113. tccli/services/essbasic/essbasic_client.py +106 -0
  114. tccli/services/essbasic/v20210526/api.json +287 -60
  115. tccli/services/essbasic/v20210526/examples.json +58 -18
  116. tccli/services/facefusion/v20181201/api.json +47 -45
  117. tccli/services/facefusion/v20181201/examples.json +2 -2
  118. tccli/services/facefusion/v20220927/api.json +54 -48
  119. tccli/services/facefusion/v20220927/examples.json +5 -5
  120. tccli/services/faceid/v20180301/api.json +497 -496
  121. tccli/services/faceid/v20180301/examples.json +219 -101
  122. tccli/services/fmu/v20191213/api.json +59 -67
  123. tccli/services/fmu/v20191213/examples.json +22 -22
  124. tccli/services/ft/v20200304/api.json +53 -57
  125. tccli/services/ft/v20200304/examples.json +14 -14
  126. tccli/services/gaap/v20180529/api.json +44 -26
  127. tccli/services/gaap/v20180529/examples.json +24 -30
  128. tccli/services/gme/v20180711/api.json +21 -11
  129. tccli/services/gme/v20180711/examples.json +1 -1
  130. tccli/services/hai/v20230812/api.json +116 -9
  131. tccli/services/hai/v20230812/examples.json +4 -4
  132. tccli/services/hunyuan/hunyuan_client.py +436 -12
  133. tccli/services/hunyuan/v20230901/api.json +1482 -118
  134. tccli/services/hunyuan/v20230901/examples.json +82 -18
  135. tccli/services/iai/v20180301/api.json +23 -19
  136. tccli/services/iai/v20180301/examples.json +2 -2
  137. tccli/services/iai/v20200303/api.json +530 -511
  138. tccli/services/iai/v20200303/examples.json +116 -86
  139. tccli/services/ig/__init__.py +4 -0
  140. tccli/services/ig/ig_client.py +195 -0
  141. tccli/services/ig/v20210518/api.json +83 -0
  142. tccli/services/ig/v20210518/examples.json +13 -0
  143. tccli/services/ioa/ioa_client.py +53 -0
  144. tccli/services/ioa/v20220601/api.json +662 -413
  145. tccli/services/ioa/v20220601/examples.json +24 -10
  146. tccli/services/iotexplorer/v20190423/api.json +73 -13
  147. tccli/services/iotexplorer/v20190423/examples.json +3 -3
  148. tccli/services/iotvideo/iotvideo_client.py +106 -0
  149. tccli/services/iotvideo/v20191126/api.json +256 -24
  150. tccli/services/iotvideo/v20191126/examples.json +19 -3
  151. tccli/services/iotvideo/v20201215/api.json +1 -1
  152. tccli/services/iotvideo/v20201215/examples.json +1 -1
  153. tccli/services/iotvideo/v20211125/api.json +1 -1
  154. tccli/services/iotvideo/v20211125/examples.json +2 -2
  155. tccli/services/iss/iss_client.py +69 -122
  156. tccli/services/iss/v20230517/api.json +10 -54
  157. tccli/services/iss/v20230517/examples.json +0 -14
  158. tccli/services/kms/v20190118/api.json +301 -268
  159. tccli/services/kms/v20190118/examples.json +45 -51
  160. tccli/services/lcic/lcic_client.py +159 -0
  161. tccli/services/lcic/v20220817/api.json +273 -1
  162. tccli/services/lcic/v20220817/examples.json +24 -0
  163. tccli/services/lighthouse/v20200324/api.json +56 -0
  164. tccli/services/live/live_client.py +159 -0
  165. tccli/services/live/v20180801/api.json +279 -9
  166. tccli/services/live/v20180801/examples.json +24 -0
  167. tccli/services/lke/v20231130/api.json +17 -17
  168. tccli/services/lke/v20231130/examples.json +19 -25
  169. tccli/services/mariadb/v20170312/api.json +7 -7
  170. tccli/services/market/v20191010/api.json +3 -3
  171. tccli/services/market/v20191010/examples.json +2 -2
  172. tccli/services/mmps/v20200710/api.json +47 -47
  173. tccli/services/mmps/v20200710/examples.json +3 -3
  174. tccli/services/mongodb/v20190725/api.json +10 -12
  175. tccli/services/monitor/v20180724/api.json +46 -19
  176. tccli/services/mps/v20190612/api.json +282 -5
  177. tccli/services/mps/v20190612/examples.json +25 -1
  178. tccli/services/mqtt/v20240516/api.json +2 -2
  179. tccli/services/mrs/v20200910/api.json +72 -34
  180. tccli/services/mrs/v20200910/examples.json +2 -2
  181. tccli/services/ms/v20180408/api.json +535 -506
  182. tccli/services/ms/v20180408/examples.json +25 -25
  183. tccli/services/oceanus/v20190422/api.json +130 -0
  184. tccli/services/ocr/ocr_client.py +232 -20
  185. tccli/services/ocr/v20181119/api.json +2263 -758
  186. tccli/services/ocr/v20181119/examples.json +200 -180
  187. tccli/services/omics/v20221128/api.json +614 -553
  188. tccli/services/omics/v20221128/examples.json +9 -9
  189. tccli/services/organization/organization_client.py +352 -34
  190. tccli/services/organization/v20210331/api.json +464 -4
  191. tccli/services/organization/v20210331/examples.json +49 -1
  192. tccli/services/partners/v20180321/api.json +244 -234
  193. tccli/services/partners/v20180321/examples.json +19 -19
  194. tccli/services/privatedns/privatedns_client.py +428 -4
  195. tccli/services/privatedns/v20201028/api.json +815 -11
  196. tccli/services/privatedns/v20201028/examples.json +64 -0
  197. tccli/services/pts/v20210728/api.json +18 -0
  198. tccli/services/pts/v20210728/examples.json +1 -1
  199. tccli/services/rce/rce_client.py +53 -0
  200. tccli/services/rce/v20201103/api.json +146 -0
  201. tccli/services/rce/v20201103/examples.json +8 -0
  202. tccli/services/redis/v20180412/api.json +42 -42
  203. tccli/services/redis/v20180412/examples.json +19 -19
  204. tccli/services/region/v20220627/api.json +1 -1
  205. tccli/services/rum/v20210622/api.json +9 -0
  206. tccli/services/scf/scf_client.py +269 -4
  207. tccli/services/scf/v20180416/api.json +569 -15
  208. tccli/services/scf/v20180416/examples.json +47 -1
  209. tccli/services/smop/v20201203/api.json +46 -42
  210. tccli/services/smop/v20201203/examples.json +2 -2
  211. tccli/services/soe/v20180724/api.json +10 -10
  212. tccli/services/sqlserver/v20180328/api.json +21 -8
  213. tccli/services/sqlserver/v20180328/examples.json +5 -5
  214. tccli/services/ssl/v20191205/api.json +98 -5
  215. tccli/services/ssm/v20190923/api.json +292 -231
  216. tccli/services/ssm/v20190923/examples.json +42 -42
  217. tccli/services/tat/v20201028/api.json +124 -122
  218. tccli/services/tat/v20201028/examples.json +24 -30
  219. tccli/services/tchd/v20230306/api.json +5 -5
  220. tccli/services/tchd/v20230306/examples.json +3 -3
  221. tccli/services/tcr/v20190924/api.json +1 -1
  222. tccli/services/tcr/v20190924/examples.json +1 -1
  223. tccli/services/tcss/v20201101/api.json +1984 -1437
  224. tccli/services/tcss/v20201101/examples.json +350 -368
  225. tccli/services/tdmq/v20200217/api.json +603 -464
  226. tccli/services/tdmq/v20200217/examples.json +105 -105
  227. tccli/services/tds/v20220801/api.json +4 -4
  228. tccli/services/tem/v20210701/api.json +429 -372
  229. tccli/services/tem/v20210701/examples.json +85 -85
  230. tccli/services/teo/teo_client.py +277 -12
  231. tccli/services/teo/v20220901/api.json +1029 -124
  232. tccli/services/teo/v20220901/examples.json +84 -8
  233. tccli/services/thpc/v20230321/api.json +5 -5
  234. tccli/services/tke/tke_client.py +270 -58
  235. tccli/services/tke/v20180525/api.json +79 -27
  236. tccli/services/tke/v20180525/examples.json +9 -1
  237. tccli/services/tke/v20220501/api.json +176 -0
  238. tccli/services/tke/v20220501/examples.json +24 -0
  239. tccli/services/tms/tms_client.py +4 -57
  240. tccli/services/tms/v20201229/api.json +0 -354
  241. tccli/services/tms/v20201229/examples.json +0 -8
  242. tccli/services/tmt/v20180321/api.json +38 -8
  243. tccli/services/trp/v20210515/api.json +86 -74
  244. tccli/services/trp/v20210515/examples.json +65 -65
  245. tccli/services/trro/v20220325/api.json +72 -71
  246. tccli/services/trro/v20220325/examples.json +8 -8
  247. tccli/services/trtc/trtc_client.py +8 -61
  248. tccli/services/trtc/v20190722/api.json +293 -52
  249. tccli/services/trtc/v20190722/examples.json +3 -11
  250. tccli/services/tse/tse_client.py +110 -4
  251. tccli/services/tse/v20201207/api.json +122 -7
  252. tccli/services/tse/v20201207/examples.json +25 -9
  253. tccli/services/vclm/v20240523/api.json +225 -82
  254. tccli/services/vclm/v20240523/examples.json +13 -19
  255. tccli/services/vod/v20180717/api.json +431 -4
  256. tccli/services/vod/v20180717/examples.json +25 -5
  257. tccli/services/vod/v20240718/api.json +11 -11
  258. tccli/services/vod/v20240718/examples.json +4 -4
  259. tccli/services/vod/vod_client.py +53 -0
  260. tccli/services/vpc/v20170312/api.json +1195 -892
  261. tccli/services/vpc/v20170312/examples.json +84 -68
  262. tccli/services/vpc/vpc_client.py +168 -62
  263. tccli/services/waf/v20180125/api.json +2611 -2187
  264. tccli/services/waf/v20180125/examples.json +224 -284
  265. tccli/services/waf/waf_client.py +225 -119
  266. tccli/services/wav/v20210129/api.json +48 -48
  267. tccli/services/wav/v20210129/examples.json +4 -4
  268. tccli/services/wedata/v20210820/api.json +1595 -25
  269. tccli/services/wedata/v20210820/examples.json +44 -4
  270. tccli/services/wedata/wedata_client.py +265 -0
  271. tccli/services/weilingwith/v20230427/api.json +6 -6
  272. tccli/services/weilingwith/v20230427/examples.json +3 -3
  273. tccli/sso.py +229 -0
  274. {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/METADATA +6 -2
  275. {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/RECORD +278 -265
  276. tccli/services/cr/__init__.py +0 -4
  277. tccli/services/cr/cr_client.py +0 -1626
  278. tccli/services/cr/v20180321/api.json +0 -2829
  279. tccli/services/cr/v20180321/examples.json +0 -235
  280. {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/WHEEL +0 -0
  281. {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/entry_points.txt +0 -0
  282. {tccli-3.0.1215.1.dist-info → tccli-3.0.1217.1.dist-info}/license_files/LICENSE +0 -0
@@ -381,7 +381,7 @@ def doDeleteIpAccessControl(args, parsed_globals):
381
381
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
382
 
383
383
 
384
- def doDescribeAntiInfoLeakRules(args, parsed_globals):
384
+ def doDescribeAreaBanAreas(args, parsed_globals):
385
385
  g_param = parse_global_arg(parsed_globals)
386
386
 
387
387
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -410,11 +410,11 @@ def doDescribeAntiInfoLeakRules(args, parsed_globals):
410
410
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
411
411
  client._sdkVersion += ("_CLI_" + __version__)
412
412
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.DescribeAntiInfoLeakRulesRequest()
413
+ model = models.DescribeAreaBanAreasRequest()
414
414
  model.from_json_string(json.dumps(args))
415
415
  start_time = time.time()
416
416
  while True:
417
- rsp = client.DescribeAntiInfoLeakRules(model)
417
+ rsp = client.DescribeAreaBanAreas(model)
418
418
  result = rsp.to_json_string()
419
419
  try:
420
420
  json_obj = json.loads(result)
@@ -433,7 +433,7 @@ def doDescribeAntiInfoLeakRules(args, parsed_globals):
433
433
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
434
 
435
435
 
436
- def doDescribeAreaBanAreas(args, parsed_globals):
436
+ def doModifyCustomRule(args, parsed_globals):
437
437
  g_param = parse_global_arg(parsed_globals)
438
438
 
439
439
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -462,11 +462,11 @@ def doDescribeAreaBanAreas(args, parsed_globals):
462
462
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
463
463
  client._sdkVersion += ("_CLI_" + __version__)
464
464
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
465
- model = models.DescribeAreaBanAreasRequest()
465
+ model = models.ModifyCustomRuleRequest()
466
466
  model.from_json_string(json.dumps(args))
467
467
  start_time = time.time()
468
468
  while True:
469
- rsp = client.DescribeAreaBanAreas(model)
469
+ rsp = client.ModifyCustomRule(model)
470
470
  result = rsp.to_json_string()
471
471
  try:
472
472
  json_obj = json.loads(result)
@@ -485,7 +485,7 @@ def doDescribeAreaBanAreas(args, parsed_globals):
485
485
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
486
 
487
487
 
488
- def doModifyCustomRule(args, parsed_globals):
488
+ def doDescribeFindDomainList(args, parsed_globals):
489
489
  g_param = parse_global_arg(parsed_globals)
490
490
 
491
491
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -514,11 +514,11 @@ def doModifyCustomRule(args, parsed_globals):
514
514
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
515
515
  client._sdkVersion += ("_CLI_" + __version__)
516
516
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
517
- model = models.ModifyCustomRuleRequest()
517
+ model = models.DescribeFindDomainListRequest()
518
518
  model.from_json_string(json.dumps(args))
519
519
  start_time = time.time()
520
520
  while True:
521
- rsp = client.ModifyCustomRule(model)
521
+ rsp = client.DescribeFindDomainList(model)
522
522
  result = rsp.to_json_string()
523
523
  try:
524
524
  json_obj = json.loads(result)
@@ -537,7 +537,7 @@ def doModifyCustomRule(args, parsed_globals):
537
537
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
538
 
539
539
 
540
- def doDescribeFindDomainList(args, parsed_globals):
540
+ def doModifyInstanceQpsLimit(args, parsed_globals):
541
541
  g_param = parse_global_arg(parsed_globals)
542
542
 
543
543
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -566,11 +566,11 @@ def doDescribeFindDomainList(args, parsed_globals):
566
566
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
567
567
  client._sdkVersion += ("_CLI_" + __version__)
568
568
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
569
- model = models.DescribeFindDomainListRequest()
569
+ model = models.ModifyInstanceQpsLimitRequest()
570
570
  model.from_json_string(json.dumps(args))
571
571
  start_time = time.time()
572
572
  while True:
573
- rsp = client.DescribeFindDomainList(model)
573
+ rsp = client.ModifyInstanceQpsLimit(model)
574
574
  result = rsp.to_json_string()
575
575
  try:
576
576
  json_obj = json.loads(result)
@@ -589,7 +589,7 @@ def doDescribeFindDomainList(args, parsed_globals):
589
589
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
590
 
591
591
 
592
- def doModifyInstanceQpsLimit(args, parsed_globals):
592
+ def doDescribeApiListVersionTwo(args, parsed_globals):
593
593
  g_param = parse_global_arg(parsed_globals)
594
594
 
595
595
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -618,11 +618,11 @@ def doModifyInstanceQpsLimit(args, parsed_globals):
618
618
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
619
619
  client._sdkVersion += ("_CLI_" + __version__)
620
620
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
- model = models.ModifyInstanceQpsLimitRequest()
621
+ model = models.DescribeApiListVersionTwoRequest()
622
622
  model.from_json_string(json.dumps(args))
623
623
  start_time = time.time()
624
624
  while True:
625
- rsp = client.ModifyInstanceQpsLimit(model)
625
+ rsp = client.DescribeApiListVersionTwo(model)
626
626
  result = rsp.to_json_string()
627
627
  try:
628
628
  json_obj = json.loads(result)
@@ -641,7 +641,7 @@ def doModifyInstanceQpsLimit(args, parsed_globals):
641
641
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
642
 
643
643
 
644
- def doDescribeApiListVersionTwo(args, parsed_globals):
644
+ def doDescribeUserSignatureRuleV2(args, parsed_globals):
645
645
  g_param = parse_global_arg(parsed_globals)
646
646
 
647
647
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -670,11 +670,11 @@ def doDescribeApiListVersionTwo(args, parsed_globals):
670
670
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
671
671
  client._sdkVersion += ("_CLI_" + __version__)
672
672
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
- model = models.DescribeApiListVersionTwoRequest()
673
+ model = models.DescribeUserSignatureRuleV2Request()
674
674
  model.from_json_string(json.dumps(args))
675
675
  start_time = time.time()
676
676
  while True:
677
- rsp = client.DescribeApiListVersionTwo(model)
677
+ rsp = client.DescribeUserSignatureRuleV2(model)
678
678
  result = rsp.to_json_string()
679
679
  try:
680
680
  json_obj = json.loads(result)
@@ -693,7 +693,7 @@ def doDescribeApiListVersionTwo(args, parsed_globals):
693
693
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
694
 
695
695
 
696
- def doDescribeSpartaProtectionInfo(args, parsed_globals):
696
+ def doDescribeAutoDenyIP(args, parsed_globals):
697
697
  g_param = parse_global_arg(parsed_globals)
698
698
 
699
699
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -722,11 +722,11 @@ def doDescribeSpartaProtectionInfo(args, parsed_globals):
722
722
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
723
723
  client._sdkVersion += ("_CLI_" + __version__)
724
724
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
725
- model = models.DescribeSpartaProtectionInfoRequest()
725
+ model = models.DescribeAutoDenyIPRequest()
726
726
  model.from_json_string(json.dumps(args))
727
727
  start_time = time.time()
728
728
  while True:
729
- rsp = client.DescribeSpartaProtectionInfo(model)
729
+ rsp = client.DescribeAutoDenyIP(model)
730
730
  result = rsp.to_json_string()
731
731
  try:
732
732
  json_obj = json.loads(result)
@@ -745,7 +745,7 @@ def doDescribeSpartaProtectionInfo(args, parsed_globals):
745
745
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
746
 
747
747
 
748
- def doDescribeAutoDenyIP(args, parsed_globals):
748
+ def doDeleteCustomWhiteRule(args, parsed_globals):
749
749
  g_param = parse_global_arg(parsed_globals)
750
750
 
751
751
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -774,11 +774,11 @@ def doDescribeAutoDenyIP(args, parsed_globals):
774
774
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
775
775
  client._sdkVersion += ("_CLI_" + __version__)
776
776
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.DescribeAutoDenyIPRequest()
777
+ model = models.DeleteCustomWhiteRuleRequest()
778
778
  model.from_json_string(json.dumps(args))
779
779
  start_time = time.time()
780
780
  while True:
781
- rsp = client.DescribeAutoDenyIP(model)
781
+ rsp = client.DeleteCustomWhiteRule(model)
782
782
  result = rsp.to_json_string()
783
783
  try:
784
784
  json_obj = json.loads(result)
@@ -797,7 +797,7 @@ def doDescribeAutoDenyIP(args, parsed_globals):
797
797
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
798
 
799
799
 
800
- def doDeleteCustomWhiteRule(args, parsed_globals):
800
+ def doGetAttackDownloadRecords(args, parsed_globals):
801
801
  g_param = parse_global_arg(parsed_globals)
802
802
 
803
803
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -826,11 +826,11 @@ def doDeleteCustomWhiteRule(args, parsed_globals):
826
826
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
827
827
  client._sdkVersion += ("_CLI_" + __version__)
828
828
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
829
- model = models.DeleteCustomWhiteRuleRequest()
829
+ model = models.GetAttackDownloadRecordsRequest()
830
830
  model.from_json_string(json.dumps(args))
831
831
  start_time = time.time()
832
832
  while True:
833
- rsp = client.DeleteCustomWhiteRule(model)
833
+ rsp = client.GetAttackDownloadRecords(model)
834
834
  result = rsp.to_json_string()
835
835
  try:
836
836
  json_obj = json.loads(result)
@@ -849,7 +849,7 @@ def doDeleteCustomWhiteRule(args, parsed_globals):
849
849
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
850
850
 
851
851
 
852
- def doGetAttackDownloadRecords(args, parsed_globals):
852
+ def doDescribeApiDetail(args, parsed_globals):
853
853
  g_param = parse_global_arg(parsed_globals)
854
854
 
855
855
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -878,11 +878,11 @@ def doGetAttackDownloadRecords(args, parsed_globals):
878
878
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
879
879
  client._sdkVersion += ("_CLI_" + __version__)
880
880
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
881
- model = models.GetAttackDownloadRecordsRequest()
881
+ model = models.DescribeApiDetailRequest()
882
882
  model.from_json_string(json.dumps(args))
883
883
  start_time = time.time()
884
884
  while True:
885
- rsp = client.GetAttackDownloadRecords(model)
885
+ rsp = client.DescribeApiDetail(model)
886
886
  result = rsp.to_json_string()
887
887
  try:
888
888
  json_obj = json.loads(result)
@@ -901,7 +901,7 @@ def doGetAttackDownloadRecords(args, parsed_globals):
901
901
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
902
902
 
903
903
 
904
- def doDescribeApiDetail(args, parsed_globals):
904
+ def doDescribeScanIp(args, parsed_globals):
905
905
  g_param = parse_global_arg(parsed_globals)
906
906
 
907
907
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -930,11 +930,11 @@ def doDescribeApiDetail(args, parsed_globals):
930
930
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
931
931
  client._sdkVersion += ("_CLI_" + __version__)
932
932
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
933
- model = models.DescribeApiDetailRequest()
933
+ model = models.DescribeScanIpRequest()
934
934
  model.from_json_string(json.dumps(args))
935
935
  start_time = time.time()
936
936
  while True:
937
- rsp = client.DescribeApiDetail(model)
937
+ rsp = client.DescribeScanIp(model)
938
938
  result = rsp.to_json_string()
939
939
  try:
940
940
  json_obj = json.loads(result)
@@ -3605,7 +3605,7 @@ def doModifyHost(args, parsed_globals):
3605
3605
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3606
3606
 
3607
3607
 
3608
- def doModifyBotStatus(args, parsed_globals):
3608
+ def doDescribeUserSignatureClass(args, parsed_globals):
3609
3609
  g_param = parse_global_arg(parsed_globals)
3610
3610
 
3611
3611
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3634,11 +3634,11 @@ def doModifyBotStatus(args, parsed_globals):
3634
3634
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3635
3635
  client._sdkVersion += ("_CLI_" + __version__)
3636
3636
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3637
- model = models.ModifyBotStatusRequest()
3637
+ model = models.DescribeUserSignatureClassRequest()
3638
3638
  model.from_json_string(json.dumps(args))
3639
3639
  start_time = time.time()
3640
3640
  while True:
3641
- rsp = client.ModifyBotStatus(model)
3641
+ rsp = client.DescribeUserSignatureClass(model)
3642
3642
  result = rsp.to_json_string()
3643
3643
  try:
3644
3644
  json_obj = json.loads(result)
@@ -3657,7 +3657,7 @@ def doModifyBotStatus(args, parsed_globals):
3657
3657
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3658
3658
 
3659
3659
 
3660
- def doModifyProtectionStatus(args, parsed_globals):
3660
+ def doModifyBotStatus(args, parsed_globals):
3661
3661
  g_param = parse_global_arg(parsed_globals)
3662
3662
 
3663
3663
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3686,11 +3686,11 @@ def doModifyProtectionStatus(args, parsed_globals):
3686
3686
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3687
3687
  client._sdkVersion += ("_CLI_" + __version__)
3688
3688
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3689
- model = models.ModifyProtectionStatusRequest()
3689
+ model = models.ModifyBotStatusRequest()
3690
3690
  model.from_json_string(json.dumps(args))
3691
3691
  start_time = time.time()
3692
3692
  while True:
3693
- rsp = client.ModifyProtectionStatus(model)
3693
+ rsp = client.ModifyBotStatus(model)
3694
3694
  result = rsp.to_json_string()
3695
3695
  try:
3696
3696
  json_obj = json.loads(result)
@@ -3709,7 +3709,7 @@ def doModifyProtectionStatus(args, parsed_globals):
3709
3709
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3710
3710
 
3711
3711
 
3712
- def doDescribeCiphersDetail(args, parsed_globals):
3712
+ def doModifyProtectionStatus(args, parsed_globals):
3713
3713
  g_param = parse_global_arg(parsed_globals)
3714
3714
 
3715
3715
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3738,11 +3738,11 @@ def doDescribeCiphersDetail(args, parsed_globals):
3738
3738
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3739
3739
  client._sdkVersion += ("_CLI_" + __version__)
3740
3740
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3741
- model = models.DescribeCiphersDetailRequest()
3741
+ model = models.ModifyProtectionStatusRequest()
3742
3742
  model.from_json_string(json.dumps(args))
3743
3743
  start_time = time.time()
3744
3744
  while True:
3745
- rsp = client.DescribeCiphersDetail(model)
3745
+ rsp = client.ModifyProtectionStatus(model)
3746
3746
  result = rsp.to_json_string()
3747
3747
  try:
3748
3748
  json_obj = json.loads(result)
@@ -3761,7 +3761,7 @@ def doDescribeCiphersDetail(args, parsed_globals):
3761
3761
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3762
3762
 
3763
3763
 
3764
- def doModifyAreaBanStatus(args, parsed_globals):
3764
+ def doDescribeCiphersDetail(args, parsed_globals):
3765
3765
  g_param = parse_global_arg(parsed_globals)
3766
3766
 
3767
3767
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3790,11 +3790,11 @@ def doModifyAreaBanStatus(args, parsed_globals):
3790
3790
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3791
3791
  client._sdkVersion += ("_CLI_" + __version__)
3792
3792
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3793
- model = models.ModifyAreaBanStatusRequest()
3793
+ model = models.DescribeCiphersDetailRequest()
3794
3794
  model.from_json_string(json.dumps(args))
3795
3795
  start_time = time.time()
3796
3796
  while True:
3797
- rsp = client.ModifyAreaBanStatus(model)
3797
+ rsp = client.DescribeCiphersDetail(model)
3798
3798
  result = rsp.to_json_string()
3799
3799
  try:
3800
3800
  json_obj = json.loads(result)
@@ -3813,7 +3813,7 @@ def doModifyAreaBanStatus(args, parsed_globals):
3813
3813
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3814
3814
 
3815
3815
 
3816
- def doModifyIpAccessControl(args, parsed_globals):
3816
+ def doModifyAreaBanStatus(args, parsed_globals):
3817
3817
  g_param = parse_global_arg(parsed_globals)
3818
3818
 
3819
3819
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3842,11 +3842,11 @@ def doModifyIpAccessControl(args, parsed_globals):
3842
3842
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3843
3843
  client._sdkVersion += ("_CLI_" + __version__)
3844
3844
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3845
- model = models.ModifyIpAccessControlRequest()
3845
+ model = models.ModifyAreaBanStatusRequest()
3846
3846
  model.from_json_string(json.dumps(args))
3847
3847
  start_time = time.time()
3848
3848
  while True:
3849
- rsp = client.ModifyIpAccessControl(model)
3849
+ rsp = client.ModifyAreaBanStatus(model)
3850
3850
  result = rsp.to_json_string()
3851
3851
  try:
3852
3852
  json_obj = json.loads(result)
@@ -3865,7 +3865,7 @@ def doModifyIpAccessControl(args, parsed_globals):
3865
3865
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3866
3866
 
3867
3867
 
3868
- def doDescribeAntiFakeRules(args, parsed_globals):
3868
+ def doModifyIpAccessControl(args, parsed_globals):
3869
3869
  g_param = parse_global_arg(parsed_globals)
3870
3870
 
3871
3871
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3894,11 +3894,11 @@ def doDescribeAntiFakeRules(args, parsed_globals):
3894
3894
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3895
3895
  client._sdkVersion += ("_CLI_" + __version__)
3896
3896
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3897
- model = models.DescribeAntiFakeRulesRequest()
3897
+ model = models.ModifyIpAccessControlRequest()
3898
3898
  model.from_json_string(json.dumps(args))
3899
3899
  start_time = time.time()
3900
3900
  while True:
3901
- rsp = client.DescribeAntiFakeRules(model)
3901
+ rsp = client.ModifyIpAccessControl(model)
3902
3902
  result = rsp.to_json_string()
3903
3903
  try:
3904
3904
  json_obj = json.loads(result)
@@ -3917,7 +3917,7 @@ def doDescribeAntiFakeRules(args, parsed_globals):
3917
3917
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3918
3918
 
3919
3919
 
3920
- def doImportIpAccessControl(args, parsed_globals):
3920
+ def doDescribeAntiFakeRules(args, parsed_globals):
3921
3921
  g_param = parse_global_arg(parsed_globals)
3922
3922
 
3923
3923
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3946,11 +3946,11 @@ def doImportIpAccessControl(args, parsed_globals):
3946
3946
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3947
3947
  client._sdkVersion += ("_CLI_" + __version__)
3948
3948
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3949
- model = models.ImportIpAccessControlRequest()
3949
+ model = models.DescribeAntiFakeRulesRequest()
3950
3950
  model.from_json_string(json.dumps(args))
3951
3951
  start_time = time.time()
3952
3952
  while True:
3953
- rsp = client.ImportIpAccessControl(model)
3953
+ rsp = client.DescribeAntiFakeRules(model)
3954
3954
  result = rsp.to_json_string()
3955
3955
  try:
3956
3956
  json_obj = json.loads(result)
@@ -3969,7 +3969,7 @@ def doImportIpAccessControl(args, parsed_globals):
3969
3969
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3970
3970
 
3971
3971
 
3972
- def doDeleteDomainWhiteRules(args, parsed_globals):
3972
+ def doImportIpAccessControl(args, parsed_globals):
3973
3973
  g_param = parse_global_arg(parsed_globals)
3974
3974
 
3975
3975
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3998,11 +3998,11 @@ def doDeleteDomainWhiteRules(args, parsed_globals):
3998
3998
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3999
3999
  client._sdkVersion += ("_CLI_" + __version__)
4000
4000
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4001
- model = models.DeleteDomainWhiteRulesRequest()
4001
+ model = models.ImportIpAccessControlRequest()
4002
4002
  model.from_json_string(json.dumps(args))
4003
4003
  start_time = time.time()
4004
4004
  while True:
4005
- rsp = client.DeleteDomainWhiteRules(model)
4005
+ rsp = client.ImportIpAccessControl(model)
4006
4006
  result = rsp.to_json_string()
4007
4007
  try:
4008
4008
  json_obj = json.loads(result)
@@ -4021,7 +4021,7 @@ def doDeleteDomainWhiteRules(args, parsed_globals):
4021
4021
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4022
4022
 
4023
4023
 
4024
- def doDescribeAccessHistogram(args, parsed_globals):
4024
+ def doDeleteDomainWhiteRules(args, parsed_globals):
4025
4025
  g_param = parse_global_arg(parsed_globals)
4026
4026
 
4027
4027
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4050,11 +4050,11 @@ def doDescribeAccessHistogram(args, parsed_globals):
4050
4050
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4051
4051
  client._sdkVersion += ("_CLI_" + __version__)
4052
4052
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4053
- model = models.DescribeAccessHistogramRequest()
4053
+ model = models.DeleteDomainWhiteRulesRequest()
4054
4054
  model.from_json_string(json.dumps(args))
4055
4055
  start_time = time.time()
4056
4056
  while True:
4057
- rsp = client.DescribeAccessHistogram(model)
4057
+ rsp = client.DeleteDomainWhiteRules(model)
4058
4058
  result = rsp.to_json_string()
4059
4059
  try:
4060
4060
  json_obj = json.loads(result)
@@ -4073,7 +4073,7 @@ def doDescribeAccessHistogram(args, parsed_globals):
4073
4073
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4074
4074
 
4075
4075
 
4076
- def doDeleteDownloadRecord(args, parsed_globals):
4076
+ def doDescribeAccessHistogram(args, parsed_globals):
4077
4077
  g_param = parse_global_arg(parsed_globals)
4078
4078
 
4079
4079
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4102,11 +4102,11 @@ def doDeleteDownloadRecord(args, parsed_globals):
4102
4102
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4103
4103
  client._sdkVersion += ("_CLI_" + __version__)
4104
4104
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4105
- model = models.DeleteDownloadRecordRequest()
4105
+ model = models.DescribeAccessHistogramRequest()
4106
4106
  model.from_json_string(json.dumps(args))
4107
4107
  start_time = time.time()
4108
4108
  while True:
4109
- rsp = client.DeleteDownloadRecord(model)
4109
+ rsp = client.DescribeAccessHistogram(model)
4110
4110
  result = rsp.to_json_string()
4111
4111
  try:
4112
4112
  json_obj = json.loads(result)
@@ -4385,58 +4385,6 @@ def doDescribeFlowTrend(args, parsed_globals):
4385
4385
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4386
4386
 
4387
4387
 
4388
- def doDescribeAntiFakeUrl(args, parsed_globals):
4389
- g_param = parse_global_arg(parsed_globals)
4390
-
4391
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4392
- cred = credential.CVMRoleCredential()
4393
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4394
- cred = credential.STSAssumeRoleCredential(
4395
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4396
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4397
- )
4398
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4399
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4400
- else:
4401
- cred = credential.Credential(
4402
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4403
- )
4404
- http_profile = HttpProfile(
4405
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4406
- reqMethod="POST",
4407
- endpoint=g_param[OptionsDefine.Endpoint],
4408
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4409
- )
4410
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4411
- if g_param[OptionsDefine.Language]:
4412
- profile.language = g_param[OptionsDefine.Language]
4413
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4414
- client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4415
- client._sdkVersion += ("_CLI_" + __version__)
4416
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
4417
- model = models.DescribeAntiFakeUrlRequest()
4418
- model.from_json_string(json.dumps(args))
4419
- start_time = time.time()
4420
- while True:
4421
- rsp = client.DescribeAntiFakeUrl(model)
4422
- result = rsp.to_json_string()
4423
- try:
4424
- json_obj = json.loads(result)
4425
- except TypeError as e:
4426
- json_obj = json.loads(result.decode('utf-8')) # python3.3
4427
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4428
- break
4429
- cur_time = time.time()
4430
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4431
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4432
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4433
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4434
- else:
4435
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4436
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4437
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4438
-
4439
-
4440
4388
  def doDescribeUserClbWafRegions(args, parsed_globals):
4441
4389
  g_param = parse_global_arg(parsed_globals)
4442
4390
 
@@ -5425,6 +5373,58 @@ def doPostAttackDownloadTask(args, parsed_globals):
5425
5373
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5426
5374
 
5427
5375
 
5376
+ def doDescribeSpartaProtectionInfo(args, parsed_globals):
5377
+ g_param = parse_global_arg(parsed_globals)
5378
+
5379
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5380
+ cred = credential.CVMRoleCredential()
5381
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5382
+ cred = credential.STSAssumeRoleCredential(
5383
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5384
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5385
+ )
5386
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5387
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5388
+ else:
5389
+ cred = credential.Credential(
5390
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5391
+ )
5392
+ http_profile = HttpProfile(
5393
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5394
+ reqMethod="POST",
5395
+ endpoint=g_param[OptionsDefine.Endpoint],
5396
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5397
+ )
5398
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5399
+ if g_param[OptionsDefine.Language]:
5400
+ profile.language = g_param[OptionsDefine.Language]
5401
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5402
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
5403
+ client._sdkVersion += ("_CLI_" + __version__)
5404
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5405
+ model = models.DescribeSpartaProtectionInfoRequest()
5406
+ model.from_json_string(json.dumps(args))
5407
+ start_time = time.time()
5408
+ while True:
5409
+ rsp = client.DescribeSpartaProtectionInfo(model)
5410
+ result = rsp.to_json_string()
5411
+ try:
5412
+ json_obj = json.loads(result)
5413
+ except TypeError as e:
5414
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5415
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5416
+ break
5417
+ cur_time = time.time()
5418
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5419
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5420
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5421
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5422
+ else:
5423
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5424
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5425
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5426
+
5427
+
5428
5428
  def doDescribeCustomWhiteRule(args, parsed_globals):
5429
5429
  g_param = parse_global_arg(parsed_globals)
5430
5430
 
@@ -5529,6 +5529,58 @@ def doDescribeHost(args, parsed_globals):
5529
5529
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5530
5530
 
5531
5531
 
5532
+ def doModifyUserSignatureRuleV2(args, parsed_globals):
5533
+ g_param = parse_global_arg(parsed_globals)
5534
+
5535
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5536
+ cred = credential.CVMRoleCredential()
5537
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5538
+ cred = credential.STSAssumeRoleCredential(
5539
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5540
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5541
+ )
5542
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5543
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5544
+ else:
5545
+ cred = credential.Credential(
5546
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5547
+ )
5548
+ http_profile = HttpProfile(
5549
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5550
+ reqMethod="POST",
5551
+ endpoint=g_param[OptionsDefine.Endpoint],
5552
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5553
+ )
5554
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5555
+ if g_param[OptionsDefine.Language]:
5556
+ profile.language = g_param[OptionsDefine.Language]
5557
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5558
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
5559
+ client._sdkVersion += ("_CLI_" + __version__)
5560
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5561
+ model = models.ModifyUserSignatureRuleV2Request()
5562
+ model.from_json_string(json.dumps(args))
5563
+ start_time = time.time()
5564
+ while True:
5565
+ rsp = client.ModifyUserSignatureRuleV2(model)
5566
+ result = rsp.to_json_string()
5567
+ try:
5568
+ json_obj = json.loads(result)
5569
+ except TypeError as e:
5570
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5571
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5572
+ break
5573
+ cur_time = time.time()
5574
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5575
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5576
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5577
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5578
+ else:
5579
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5580
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5581
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5582
+
5583
+
5532
5584
  def doDescribeAccessExports(args, parsed_globals):
5533
5585
  g_param = parse_global_arg(parsed_globals)
5534
5586
 
@@ -7193,6 +7245,58 @@ def doDescribeUserSignatureRule(args, parsed_globals):
7193
7245
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7194
7246
 
7195
7247
 
7248
+ def doBatchOperateUserSignatureRules(args, parsed_globals):
7249
+ g_param = parse_global_arg(parsed_globals)
7250
+
7251
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
7252
+ cred = credential.CVMRoleCredential()
7253
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
7254
+ cred = credential.STSAssumeRoleCredential(
7255
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
7256
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
7257
+ )
7258
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
7259
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
7260
+ else:
7261
+ cred = credential.Credential(
7262
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
7263
+ )
7264
+ http_profile = HttpProfile(
7265
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
7266
+ reqMethod="POST",
7267
+ endpoint=g_param[OptionsDefine.Endpoint],
7268
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
7269
+ )
7270
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
7271
+ if g_param[OptionsDefine.Language]:
7272
+ profile.language = g_param[OptionsDefine.Language]
7273
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
7274
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
7275
+ client._sdkVersion += ("_CLI_" + __version__)
7276
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
7277
+ model = models.BatchOperateUserSignatureRulesRequest()
7278
+ model.from_json_string(json.dumps(args))
7279
+ start_time = time.time()
7280
+ while True:
7281
+ rsp = client.BatchOperateUserSignatureRules(model)
7282
+ result = rsp.to_json_string()
7283
+ try:
7284
+ json_obj = json.loads(result)
7285
+ except TypeError as e:
7286
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
7287
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
7288
+ break
7289
+ cur_time = time.time()
7290
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
7291
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
7292
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
7293
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
7294
+ else:
7295
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
7296
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
7297
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7298
+
7299
+
7196
7300
  def doFreshAntiFakeUrl(args, parsed_globals):
7197
7301
  g_param = parse_global_arg(parsed_globals)
7198
7302
 
@@ -7523,17 +7627,17 @@ ACTION_MAP = {
7523
7627
  "GetAttackTotalCount": doGetAttackTotalCount,
7524
7628
  "DescribeBatchIpAccessControl": doDescribeBatchIpAccessControl,
7525
7629
  "DeleteIpAccessControl": doDeleteIpAccessControl,
7526
- "DescribeAntiInfoLeakRules": doDescribeAntiInfoLeakRules,
7527
7630
  "DescribeAreaBanAreas": doDescribeAreaBanAreas,
7528
7631
  "ModifyCustomRule": doModifyCustomRule,
7529
7632
  "DescribeFindDomainList": doDescribeFindDomainList,
7530
7633
  "ModifyInstanceQpsLimit": doModifyInstanceQpsLimit,
7531
7634
  "DescribeApiListVersionTwo": doDescribeApiListVersionTwo,
7532
- "DescribeSpartaProtectionInfo": doDescribeSpartaProtectionInfo,
7635
+ "DescribeUserSignatureRuleV2": doDescribeUserSignatureRuleV2,
7533
7636
  "DescribeAutoDenyIP": doDescribeAutoDenyIP,
7534
7637
  "DeleteCustomWhiteRule": doDeleteCustomWhiteRule,
7535
7638
  "GetAttackDownloadRecords": doGetAttackDownloadRecords,
7536
7639
  "DescribeApiDetail": doDescribeApiDetail,
7640
+ "DescribeScanIp": doDescribeScanIp,
7537
7641
  "DeleteCustomRule": doDeleteCustomRule,
7538
7642
  "ModifyAntiFakeUrl": doModifyAntiFakeUrl,
7539
7643
  "ModifySpartaProtection": doModifySpartaProtection,
@@ -7585,6 +7689,7 @@ ACTION_MAP = {
7585
7689
  "DescribeSession": doDescribeSession,
7586
7690
  "DescribeTopAttackDomain": doDescribeTopAttackDomain,
7587
7691
  "ModifyHost": doModifyHost,
7692
+ "DescribeUserSignatureClass": doDescribeUserSignatureClass,
7588
7693
  "ModifyBotStatus": doModifyBotStatus,
7589
7694
  "ModifyProtectionStatus": doModifyProtectionStatus,
7590
7695
  "DescribeCiphersDetail": doDescribeCiphersDetail,
@@ -7594,13 +7699,11 @@ ACTION_MAP = {
7594
7699
  "ImportIpAccessControl": doImportIpAccessControl,
7595
7700
  "DeleteDomainWhiteRules": doDeleteDomainWhiteRules,
7596
7701
  "DescribeAccessHistogram": doDescribeAccessHistogram,
7597
- "DeleteDownloadRecord": doDeleteDownloadRecord,
7598
7702
  "DescribeTlsVersion": doDescribeTlsVersion,
7599
7703
  "ModifyAntiInfoLeakRules": doModifyAntiInfoLeakRules,
7600
7704
  "CreateIpAccessControl": doCreateIpAccessControl,
7601
7705
  "AddAntiFakeUrl": doAddAntiFakeUrl,
7602
7706
  "DescribeFlowTrend": doDescribeFlowTrend,
7603
- "DescribeAntiFakeUrl": doDescribeAntiFakeUrl,
7604
7707
  "DescribeUserClbWafRegions": doDescribeUserClbWafRegions,
7605
7708
  "DescribeObjects": doDescribeObjects,
7606
7709
  "ModifyDomainWhiteRule": doModifyDomainWhiteRule,
@@ -7620,8 +7723,10 @@ ACTION_MAP = {
7620
7723
  "ModifyDomainsCLSStatus": doModifyDomainsCLSStatus,
7621
7724
  "RefreshAccessCheckResult": doRefreshAccessCheckResult,
7622
7725
  "PostAttackDownloadTask": doPostAttackDownloadTask,
7726
+ "DescribeSpartaProtectionInfo": doDescribeSpartaProtectionInfo,
7623
7727
  "DescribeCustomWhiteRule": doDescribeCustomWhiteRule,
7624
7728
  "DescribeHost": doDescribeHost,
7729
+ "ModifyUserSignatureRuleV2": doModifyUserSignatureRuleV2,
7625
7730
  "DescribeAccessExports": doDescribeAccessExports,
7626
7731
  "ModifyGenerateDeals": doModifyGenerateDeals,
7627
7732
  "DescribeHostLimit": doDescribeHostLimit,
@@ -7654,6 +7759,7 @@ ACTION_MAP = {
7654
7759
  "UpsertSession": doUpsertSession,
7655
7760
  "DescribeCCAutoStatus": doDescribeCCAutoStatus,
7656
7761
  "DescribeUserSignatureRule": doDescribeUserSignatureRule,
7762
+ "BatchOperateUserSignatureRules": doBatchOperateUserSignatureRules,
7657
7763
  "FreshAntiFakeUrl": doFreshAntiFakeUrl,
7658
7764
  "DescribeDomainRules": doDescribeDomainRules,
7659
7765
  "ModifyApiSecEventChange": doModifyApiSecEventChange,